Sunteți pe pagina 1din 3

IPASJ International Journal of Management (IIJM)

Web Site: http://www.ipasj.org/IIJM/IIJM.htm


Email: editoriijm@ipasj.org
ISSN 2321-645X

A Publisher for Research Motivation........

Volume 3, Issue 9, September 2015

Study on Computer File Protection


ZHU Zhenfang
School of Information Science and Electric Engineering, Shandong Jiaotong University, Jinan, China

ABSTRACT
With the development of science and technology, computers have a large number of applications, electronic files has become
the main way of information storage, and electronic file information security research is a hot issue in the international
community research, for traditional paper document, electronic file management has brought new challenges. To protect the
security of electronic documents in file management study also have very important role. This research was mainly in the
aspect of system protection of electronic documents, analyzed and researched on protection. Therefore, the analysis of the
electronic document protection and study to the security of computer use in China has important significance.

Keywords: Electronic Files, File Protection, File Protection Technology

1. INTRODUCTION
With the development of technology, computer is widely applied, and electronic files have become the major
information storage method at present. At the same time, the study on information security of electronic files becomes
the hot issue in social study all around the world. Electric file brings new challenge to traditional paper document
management, so the study on electric file security also plays an important role in the study on file management.
Professional study has been made on the protection of electric file all over the world and drawn attention from many
security institutions and some scholars. The protection of electric file has significance in two aspects of organization
and system. The so-called organization aspect mainly refers to some laws and regulations for protection of electronic
files, as well as the legal punishment for electric file disclosure, while system aspect to the software and hardware for
the protection of electronic files. This study mainly focuses on analysis and study on the protection method and effect
for electronic files in aspect of organization. Therefore, the study on the protection and analysis on electronic files has
significant reference effects on the security of computer use in China.

2. FILE PROTECTION TECHNOLOGY


Different from paper file which can be protected by storing paper files, electric file is relatively special because it
requires preventing damage for misoperation. Therefore, the protection for the storage with electronic files is only a
basic protection method. For protection of electronic files, various technological methods are required to give
comprehensive protection to electronic files in storage besides the protection to storage carrier to comprehensively
ensure the safety and integrity of electronic files. Normal reproduction and read are the most basic requirement in the
protection of electric file.

3. STUDY ON FILE PROTECTION TECHNOLOGY


3.1 Digital signature
The working principle of digital signature is to use private encryption for signature and verify with public key. It is a
new application developed based on asymmetric encryption technology. Asymmetric encryption technology is also
called public encryption. The secret key for file open is composed of public key and private key. During the data
transfer, a series of sequence transferred in data information is information summary. The final goal to encrypt the file
with private key is the digital signature. The complete process of digital signature mainly includes digital signature and
signature verification. The digital signature can prevent file forge, illegal manipulation, and reuse of signature.
3.2 Anti-virus technology of computer
Computer virus is a computer program greatly damaging computer system. It can complete self-replication, and enter
computer system under unauthorized conditions to steal data or temper the program. Once upon the computer is
affected by this virus of computer program, the files in the computer will not safe anymore and is possible to be
controlled by the hackers of virus.
The earliest computer virus occurred in the middle of 1980s. In the initial stage of rapid development, some viruses
entered into other computers with data package or e-mail to realize the goal of stealing information. Therefore,
effective anti-virus technology is required to protect the security of electronic files.

Volume 3, Issue 9, September 2015

Page 1

IPASJ International Journal of Management (IIJM)


A Publisher for Research Motivation........

Volume 3, Issue 9, September 2015

Web Site: http://www.ipasj.org/IIJM/IIJM.htm


Email: editoriijm@ipasj.org
ISSN 2321-645X

3.3 Fault-tolerant technique of computer


The working principle of fault-tolerant technique is that when data and files damage or lose for various reasons, the
computer system can automatically recover the damaged or lost files and data back to the state before accident and keep
the system continuously and normally operate. This fault-tolerant computer system uses special software, hardware, and
other computer components to reuse the system backup. There is special storage chip, processor, and disc storage
devices in the computer, so software programs like expanded program flow monitoring mechanism or self-inspection
logics can be used to detect failure and automatically transfer to backup for subsequent work. At present, the technique
of computer software and hardware is mature, so the cost for using fault-tolerant system of computer is relatively low,
while the speed of error correction is faster and faster, which takes effects on the protection of electronic files.
3.4 Information backup technique of electronic files
This technique can ensure the auxiliary backup function when electronic files are lost and damaged for misoperation.
When the file system fails and cannot be opened, the original backup files can be recovered by backup technology. This
technology can conduct different backup safety settings according to different file classes. The information backup is
mainly online backup with auxiliary way of off-line backup; while the file backup is mainly cold backup with auxiliary
way of online backup. The information of electronic files are backed up in following four ways: 1. complete backup
which requires to copy the backup files into other storage discs; 2. incremental backup which can copy or transfer to the
specific storage position at any time after increase or partial modification of backed up files; 3. differential backup
which backs up the part different from the last backup to save time; 4. achievement backup which copy and transfer the
whole backup files to the off-line storage. By comparison, the first three methods take backup when computer operates,
so the operation is relatively convenient. The forth method pays more attention to the file integrity in backup, but the
backup cannot be changed for the off-line backup.
3.5 Network security
Network is the major environment for electronic file transfer and application. Therefore, the network security is
necessary to ensure the security of electronic files. At present, the internet is increasingly mature, data need to be
transferred through network. In the past close environment, only a few and dozens of computers are used to complete
data exchange. At present, however, communication can be conducted through the internet all over the world, so the
security is drawn from everyone. The network accident always occurs to threat the network security, including
unauthorized network access, cockhorse remote control system, data destroy by hackers, spyware attack, system
vulnerability attacked by virus and control port, and data stealing by phishing. Therefore, enough attention should be
paid to security problem brought to the internet.

4. CONCLUSIONS
The long-term protection of electronic files is a very hard work by a lot of protection measures, However, the effects of
these methods are limited, while input from multiple fields, including politics, economics, law, culture, and technology
is required to find a more feasible and convenient protective measures by integrating all effective ways. At the same
time, it also requires study and cooperation from multiple subjects and departments to finally form a comprehensive
social atmosphere and technical environment to protect electronic files and realize the protection of electronic files.
ACKNOWLEDGMENTS
National Natural Science Foundation (61373148), National Social Science Fund (12BXW040); Shandong Province
Natural Science Foundation (ZR2012FM038, ZR2011FM030); Shandong Province Outstanding Young Scientist
Award Fund (BS2013DX033), Science Foundation of Ministry of Education of China(14YJC860042).

REFERENCES
[1]
[2]
[3]
[4]

China Science and technology society. Computer and network laws and regulations [M]. Beijing: Law Press, 2000
Feng Huiling. [M]. Beijing: Chinese people's publishing house, 2001
Liu Wei, Wang Zhongxia. Data recovery advanced technology [M], electronic industry press.2006-11.
Chen Xiangqun, Yong.Windows operating system principle of [M]. version second. Mechanical Engineering
Press, 2004
[5] Liu Jiazhen. Overview of long-term access to digital information and information [J]. information journal, 1999
(7).
[6] Zhang Meifang, Guo Lizhu, Zhang Jianhua. The archives protection technology course [M]. Renmin University of
China press, 2000 (8) the first edition
[7] Zhao Dong, Xiao Zhihong. The legal system of security information security in the United States and the reference
[J]. Journal of Chinese People's Public Security University (SOCIAL SCIENCE EDITION), 2007 (5).

Volume 3, Issue 9, September 2015

Page 2

IPASJ International Journal of Management (IIJM)


A Publisher for Research Motivation........

Volume 3, Issue 9, September 2015

Web Site: http://www.ipasj.org/IIJM/IIJM.htm


Email: editoriijm@ipasj.org
ISSN 2321-645X

[8] Ding Mei. The status of electronic file research is compared with the [J]. archives, 2001 (6): 23-24.
[9] Su min, Li Jing. American standard system and strategic analysis of [J]. Chinese standardization, 2006 (9).
[10] Xue Lingyun, Yang Jian. The status quo and development trend of foreign electronic signature law [J].
international trade issues, 2004 (6).
[11] Lu Kaicheng. Data confidentiality and security of a computer cryptography in a computer network (Third Edition).
Tsinghua University press.
[12] Li Xiaoxia. Comparative study on the construction of Chinese and foreign information security law system [J].
China master's degree thesis database, 2006 (6).
[13] Meng Xianyong, Wang Guoxin. Analysis of the development trend of information security technology [J]. office
automation, 2008 (6).
[14] Margaret Hedstom, Ding Huadong, Zhang Bin (translation). The framework of the electronic document research
[J]., 1994 (8).
[15] Li forward. The status quo and development direction of the research on optical disc protection technology [J].
archives and construction, 2006 (1):78-79.
AUTHORS BIOGRAPHY
ZHU Zhenfang , PhD, lecturer, he was born in 1980, Linyi City, Shandong Province. He obtained
Ph.D. in management engineering and industrial engineering at the Shandong Normal University in
2012, his main research fields including the security of network information, network information
filtering, information processing etc.. The authors present the lecturer at the Shandong Jiaotong
University, published more than 30 papers over the year.

Volume 3, Issue 9, September 2015

Page 3

S-ar putea să vă placă și